Analysis
-
max time kernel
120s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 01:03
Behavioral task
behavioral1
Sample
852a7927d2f4c520a131e729a78a7dd0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
852a7927d2f4c520a131e729a78a7dd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
852a7927d2f4c520a131e729a78a7dd0N.exe
-
Size
91KB
-
MD5
852a7927d2f4c520a131e729a78a7dd0
-
SHA1
ba6ce7ccb67de44b81917873a69b9f8b404126ee
-
SHA256
596244532a1c8da374cd652dfacb4c54b35a330907508567b89d87aa256854d0
-
SHA512
f5d4e2d094bede6e4a35c72b8e723b64494f0ce6e28d2155e4a8c3f68ee7239387ddb783a50f16b8409e69d9b75a4970c06d028f4048d847fb360fd64b826dc3
-
SSDEEP
1536:V7Zf/FAxTWoJJ7Tx4PN54PN2TW7JJ7Tx4PN54PNe:fny1EWXEWg
Malware Config
Signatures
-
Renames multiple (4508) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
resource yara_rule behavioral2/memory/2816-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000900000002348e-2.dat upx behavioral2/files/0x00080000000234a1-6.dat upx behavioral2/memory/2816-862-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationClient.resources.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Windows.Forms.Design.Editors.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\jcup.md.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-ppd.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ComponentModel.TypeConverter.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\System.Xaml.resources.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-140.png.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Grace-ppd.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-ul-phn.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\tipresx.dll.mui.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.CompilerServices.VisualC.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Luna.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_zh_HK.properties.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebClient.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\System\Ole DB\sqloledb.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.FileVersionInfo.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jre-1.8\bin\javaws.exe.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.AeroLite.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jre-1.8\bin\javaw.exe.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_MoveNoDrop32x32.gif.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jre-1.8\LICENSE.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Private.CoreLib.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentDemoR_BypassTrial180-ppd.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Trial-pl.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ppd.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\UIAutomationClient.resources.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jre-1.8\lib\cmm\CIEXYZ.pf.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_MAK_AE-ul-phn.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial-ul-oob.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrcommonlm.dat.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-rtlsupport-l1-1-0.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-convert-l1-1-0.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ExcelInterProviderRanker.bin.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\System.Windows.Controls.Ribbon.resources.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\Microsoft.VisualBasic.Forms.resources.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-ppd.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Office.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.IsolatedStorage.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\cldr.md.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_EnterpriseSub_Bypass30-ppd.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-ul-oob.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\ReachFramework.resources.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\classes.jsa.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\EXCELPLUGINDATAPROVIDER.DLL.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XDocument.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\UIAutomationClientSideProviders.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-oob.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Office16\csi.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\logging.properties.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-pl.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ul-phn.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.Specialized.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\WindowsFormsIntegration.resources.dll.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\local_policy.jar.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_KMS_Client-ul-oob.xrm-ms.tmp 852a7927d2f4c520a131e729a78a7dd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 852a7927d2f4c520a131e729a78a7dd0N.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55e7d1b7b180d0939dd4f83e7b9591d9f
SHA199e93a6c3378550b590a85283dc946688d5ee435
SHA2566d116af75b051a47816904558a949cd037e078d8deae2624d181cc1dca3a6170
SHA51244806a9fc2f946e5b3890abd3fa3086d33d2be2f57e349fdec9aac85cf2dc4834933a4838f74dce74041dc2dd54606c46dc30ab0a168ff47ade5a7c088c3b52c
-
Filesize
191KB
MD55f413197a16845fdcd2d03f9f2435d90
SHA1e483300b479fd7dc516cedbf1026f224f723064f
SHA25616a7345463234a62d2fbfe7ffda5e02eda7e0b1ee7e0c29b8dcd4c56f672a628
SHA5122805a79b63a8f42bb4cb2f27e84f95b0238856741c93ab6b7fa5e8a54072aa6df3f94fd695f96ba8941b766fa2dcc20ea1018a39c62705306577833ecfbee5d8